UNDERSTANDING WS-FEDERATION Agenda WS-Trust and WS-Federation - - PowerPoint PPT Presentation

understanding ws federation agenda
SMART_READER_LITE
LIVE PREVIEW

UNDERSTANDING WS-FEDERATION Agenda WS-Trust and WS-Federation - - PowerPoint PPT Presentation

Specification features in selected application scenarios UNDERSTANDING WS-FEDERATION Agenda WS-Trust and WS-Federation Fundamentals Enterprise Scenario Request for Proposal Healthcare Scenario Patient Record Access 2 6/6/2007


slide-1
SLIDE 1

UNDERSTANDING WS-FEDERATION

Specification features in selected application scenarios

slide-2
SLIDE 2

Agenda

  • WS-Trust and WS-Federation Fundamentals
  • Enterprise Scenario – Request for Proposal
  • Healthcare Scenario – Patient Record Access

6/6/2007

2

slide-3
SLIDE 3

WS-Trust

  • Defines Security Token Service (STS) model

for security tokens including

 Requesting  Issuing  Renewing  Cancelling  Validating

  • Token type agnostic

6/6/2007

3

slide-4
SLIDE 4

The STS Model

Requestor STS

Policy Claims Security Token

Resource Provider

Policy Claims Security Token Policy Claims Security Token

6/6/2007

4

slide-5
SLIDE 5

WS-Federation

  • Enables richer trust relationships
  • Allows authorized access to resources in one realm

provided to security principles managed in another

  • Defines mechanisms as extensions to WS-Trust for:

 Brokering of identity  Attribute discovery and retrieval  Authentication and authorization claims between

federation partners

 Protection of the privacy of claims across organizational

boundaries

  • Provides for mapping of the above, and WS-Trust

token issuance messages, onto HTTP for web browser clients

6/6/2007

5

slide-6
SLIDE 6

Enterprise scenario

  • Request for Proposal

 First interaction between new business partners  Simple review, bid and status check for RFPs

  • WS-Federation features demonstrated:

 Federation Metadata  Application specific Policy and Metadata  Authorization Context  Common Claim Types  Web Browser Requestors

6/6/2007

6

slide-7
SLIDE 7

Initial RFP Request

Fabrikam is new partner of Contoso Fabrikam Employee initiates first request to get available RFPs from the Contoso service Request is secured by a token signed with Fabrikam’s signing key

Fabrikam Employee GetRFP Contoso RFP Service

Contoso attempts to authenticate the request but finds that additional configuration is needed because this is the first time the two have worked together Request is put on hold

6/6/2007

7

slide-8
SLIDE 8

Federation Configuration

Contoso algorithmically constructs endpoint to retrieve Fabrikam’s Federation Metadata Document This contains Fabrikam’s signing key as well as additional information, (e.g. supported claim types) Contoso’s system configures itself and can now authenticate requests from Fabrikam The held request is authenticated and a response is returned

Federation Metadata Document fed:TokenSigningKeyInfo Https request Contoso System Fabrikam System

Fabrikam Employee RFP Response Contoso RFP Service 6/6/2007

8

slide-9
SLIDE 9

Specific Metadata Required

A Fabrikam employee submits a bid to the Contoso service *Only Bonded Employees

are authorized to submit bids

A specialized SOAP fault is returned indicating the specific policy and metadata required to process this request. The claim type is expressed using the Common Claims Dialect

Fault – fed:SpecificMetadata Fabrikam Employee Place Bid Contoso RFP Service

<wst:Claims Dialect="…/authorization/authclaims"> <auth:ClaimType Uri="…/claims/Group"> <auth:Value>Bonded</auth:Value> </auth:ClaimType> </wst:Claims>

6/6/2007

9

slide-10
SLIDE 10

Authorization Context

The Fabrikam client issues a request to the Fabrikam STS for the required claims The Fabrikam client provides additional context for the request via WS-Federation’s Authorization Context The Fabrikam client resubmits the bid with the original token and the new token to the Contoso RFP service

RSTR RST – auth:ClaimType auth:AdditionalContext Fabrikam Employee Fabrikam STS Bonded Bid Response Bonded Place Bid Contoso RFP Service Fabrikam Bonded Employee

6/6/2007

10

slide-11
SLIDE 11

Enterprise web requestor

GET resource (RFP status web page) GET requestor token POST requestor token Redirect to requestor IP/STS Return requestor token Return resource (RFP status web page for Fabrikam)

Fabrikam Employee Fabrikam System and STS Contoso System and RFP status website

6/6/2007

11

slide-12
SLIDE 12

Complete Enterprise Scenario

GetRFP GetRFP Response

Fabrikam Employee Fabrikam System and STS Contoso System and RFP Service

Https request

6/6/2007

12

slide-13
SLIDE 13

Complete Enterprise Scenario

Place Bid RST RSTR Fault

Fabrikam Employee Fabrikam System and STS Contoso System and RFP Service

Bonded

Place Bid Bid Response

Bonded

6/6/2007

13

slide-14
SLIDE 14

Enterprise Scenario Review

  • Federation Metadata

 Automated configuration between Contoso and

Fabrikam

  • Application specific Policy and Metadata

 Indicated specific claim required

  • Authorization Context

 Provided additional context for token request

  • Common Claim Types

 Used to express required claims

  • Web Browser Requestors

 Review bid status web page

6/6/2007

14

slide-15
SLIDE 15

Healthcare Scenario

  • Patient Record Access

 Emergency health record requested for an

unconscious patient

 Multiple organizational boundaries crossed

  • WS-Federation Features

 Federation Metadata  Application specific Policy and Metadata  Authorization Context  Privacy Protection  Sign Out

6/6/2007

15

slide-16
SLIDE 16

ER Doctor Signs In

The scenario begins with an ER Doctor who starts a shift and signs into an application. An STS of a certifying Medical Authority issues a token containing claims that the ER Doctor is a licensed physician The Hospital STS issues a token with claims that the ER Doctor is on duty.

Medical Authority IP/STS Hospital IP/STS Doctor T1 On Duty T2 ER Doctor

6/6/2007

16

slide-17
SLIDE 17

Health Record Service Discovery

An unconscious patient arrives at the ER The patient has a student ID card with a link to an affiliated University Hospital Health Record Service Hospital staff enter the link into their system which retrieves endpoints and metadata from the University Hospital Federation Metadata Document is returned with specific access requirements

Staff Federation Metadata Document GetMetadata University Hospital Health Record Service

6/6/2007

17

slide-18
SLIDE 18

Specific Policy and Metadata

ER Doctor chooses the emergency access

  • ption which requires a

token with claims from the Medical Authority that are satisfied by T1 A fault is returned that indicates an additional token is required from the patient’s Primary Care Provider The fault also contains Authorization Context information to pass on to assist the Primary Care Provider in processing the request for the token

ER Doctor Doctor T1 Request Fault - fed:TokenIssuerEndpoint University Hospital Health Record Service

<sp:RequestSecurityTokenTemplate> <auth:AdditionalContext> <auth:ContextItem Name=".../AccessReq"> <auth:Value>...</auth:Value> </auth:ContextItem> </auth:AdditionalContext> </sp:RequestSecurityTokenTemplate>

6/6/2007

18

slide-19
SLIDE 19

Patient Selected Delegate

In a normal case the request for patient records would have been successful In this case, the patient upon enrolling with the University Hospital insurance program indicated their Primary Care Physician as a delegate to release records rather than allow any certified doctor access

University Health Record Service Primary Care Provider Health Record Service Federation Metadata Document fed:TokenSigningKeyInfo GetMetadata

The University Hospital and the Primary Care Physician then entered into a federation to share signing keys, claims, etc.

6/6/2007

19

slide-20
SLIDE 20

Acquiring the Missing Token

The Hospital client acquires the interface and metadata of the Primary Care Provider STS Included within the Federation Metadata Document are the

  • ffered claim types of

the service One of the claim types understood by the Hospital client is one it does not want exposure to if it is issued

<fed:UriNamedClaimTypesOffered> <fed:ClaimType Uri=".../PsychiatricHistory"> <fed:DisplayName> Psychiatric History Record Locator </fed:DisplayName> </fed:ClaimType> <fed:ClaimType Uri=".../MedicalHistory"> <fed:DisplayName> Medical History Record Locator </fed:DisplayName> </fed:ClaimType> </fed:UriNamedClaimTypesOffered>

6/6/2007

20

slide-21
SLIDE 21

Requesting the Missing Token

Two tokens are required for authenticating a request for the missing token T3 that are satisfied by T1 and T2 This is a more stringent requirement for access to the patient records than the University Hospital’s requirements The RST from the Hospital Client indicates the claim it does not want exposure to should be protected using Privacy Confidential Tokens feature, presumably so that only the PCP and the University Hospital can access it

ER Doctor RSTR On Duty T2 Doctor T1 Primary Care Provider STS RST

Medical History

T3

<priv:ProtectData> <wst:Claims Dialect=".../authorization/authclaims"> <auth:ClaimType Uri=".../PsychiatricHistory"/> </wst:Claims> </priv:ProtectData>

6/6/2007

21

slide-22
SLIDE 22

Sign out

The ER Doctor logs out

  • f the Hospital

application at the end

  • f the day

A SignOut message is sent to each of the endpoints, which the Hospital application has tracked throughout the day, so that unneeded endpoint states can be cleaned up.

Primary Care Provider STS Hospital System and STS University Hospital Health Record Service Medical Authority STS Doctor T1 fed:SignOut ER Doctor fed:SignOut fed:SignOut f e d : S i g n O u t

6/6/2007

22

slide-23
SLIDE 23

Complete Healthcare Scenario

Hospital Staff University Hospital Health Record Service Primary Care Provider STS Hospital System and STS

GetMetadata GetMetadata

6/6/2007

23

slide-24
SLIDE 24

Complete Healthcare Scenario

Request Fault

ER Doctor University Hospital Health Record Service Primary Care Provider STS

RST RSTR

Hospital System and STS

Doctor

GetMetadata

On Duty Doctor

Medical History

6/6/2007

24

slide-25
SLIDE 25

Complete Healthcare Scenario

Request Response

ER Doctor University Hospital Health Record Service Primary Care Provider STS Hospital System and STS

Doctor

Medical History

6/6/2007

25

slide-26
SLIDE 26

Healthcare Scenario Review

  • Federation Metadata

 Used in configuration between participants  Use of Token Issuer, Authorization Context and Offered Claims

shown

  • Application specific Policy and Metadata

 Shown use when additional token and issuer required

  • Authorization Context

 Shown in use from a Relying Party to assist STS in making

authorization decision

  • Privacy Protection

 Used by Hospital client to avoid possible exposure to sensitive

claim

  • Sign Out

 Cleans up state for tokens issued that are no longer required

6/6/2007

26

slide-27
SLIDE 27

Review

  • WS-Trust STS Model and WS-Federation
  • Scenarios

 Enterprise – Request For Proposal  Healthcare – Patient Record Access

  • WS-Federation features shown

 Federation Metadata  Application specific Policy and Metadata  Authorization Context  Common Claim Types  Privacy Protection  Sign Out  Web Browser Requestors

6/6/2007

27